Mounira Msahli

Orcid: 0000-0003-0331-493X

According to our database1, Mounira Msahli authored at least 29 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
NFA: A neural factorization autoencoder based online telephony fraud detection.
Digit. Commun. Networks, 2024

Formal Analysis of C-ITS PKI Protocols.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Laser Shield: a Physical Defense with Polarizer against Laser Attacks on Autonomous Driving Systems.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

2023
Guest Editorial Special Issue on Social Studies, Human Factors, and Applications in Metaverse.
IEEE Trans. Comput. Soc. Syst., October, 2023

Wangiri Fraud: Pattern Analysis and Machine-Learning-Based Detection.
IEEE Internet Things J., 2023

ATTA: Adversarial Task-transferable Attacks on Autonomous Driving Systems.
Proceedings of the IEEE International Conference on Data Mining, 2023

Public-attention-based Adversarial Attack on Traffic Sign Recognition.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
A Machine-Learning-Blockchain-Based Authentication Using Smart Contracts for an IoHT System.
Sensors, 2022

Survey on recent trends towards generalized differential and boomerang uniformities.
Cryptogr. Commun., 2022

2021
Topological Graph Convolutional Network-Based Urban Traffic Flow and Density Prediction.
IEEE Trans. Intell. Transp. Syst., 2021

A Survey on the Current Security Landscape of Intelligent Transportation Systems.
IEEE Access, 2021

Machine Learning Detection for SMiShing Frauds.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
TLS Authentication Using Intelligent Transport System (ITS) Certificates.
RFC, September, 2020

2019
Security Interoperability for Cooperative ITS: Architecture and Validation.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Privacy as a Service: Anonymisation of NetFlow Traces.
Proceedings of the Advances in E-Business Engineering for Ubiquitous Computing, 2019

2017
Protocol for preserving privacy in distributed system (PPDS).
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Preserving privacy in distributed system (PPDS) protocol: Security analysis.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

TLS for Cooperative ITS Services.
Proceedings of the Internet of Vehicles. Technologies and Services for Smart Cities, 2017

Towards an Efficient File Synchronization between Digital Safes.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Extending TLS with KMIP Protocol for Cloud Computing.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

SyncDS: A digital safe based file synchronization approach.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
Safe box cloud authentication using TLS extesion.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Digital safe: Secure synchronization of shared files.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2014
Towards a Fine-Grained Access Control for Cloud.
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014

PCM in cloud.
Proceedings of the 2014 IEEE International Conference on Granular Computing, 2014

2013
Access control in probative value Cloud.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

SBaaS: Safe Box as a service.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Data-based access control in named data networking.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013


  Loading...